146
Views
19
CrossRef citations to date
0
Altmetric
Original Articles

Efficient hiding of confidential high-utility itemsets with minimal side effects

, , ORCID Icon, , &
Pages 1225-1245 | Received 07 Nov 2015, Accepted 29 Apr 2017, Published online: 15 May 2017

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (2)

Xuan Liu, Genlang Chen, Shiting Wen & Jingfang Huang. (2022) Effective algorithms for mining frequent-utility itemsets. Journal of Experimental & Theoretical Artificial Intelligence 0:0, pages 1-28.
Read now
Emmanuelle Grislin-Le Strugeon, Kathia Marcal de Oliveira, Marie Thilliez & Dorian Petit. (2022) A systematic mapping study on agent mining. Journal of Experimental & Theoretical Artificial Intelligence 34:2, pages 189-214.
Read now

Articles from other publishers (17)

Duc Nguyen, Minh-Thai Tran & Bac Le. (2023) A new algorithm using integer programming relaxation for privacy-preserving in utility mining. Applied Intelligence 53:21, pages 25106-25118.
Crossref
Mohamed Ashraf, Sherine Rady, Tamer Abdelkader & Tarek F. Gharib. (2023) Efficient privacy preserving algorithms for hiding sensitive high utility itemsets. Computers & Security 132, pages 103360.
Crossref
Mohamed Ashraf, Sherine Rady, Tamer Abdelkader & Tarek F. Gharib. 2023. Proceedings of the 8th International Conference on Advanced Intelligent Systems and Informatics 2022. Proceedings of the 8th International Conference on Advanced Intelligent Systems and Informatics 2022 381 394 .
Bac Le, Tin Truong, Hai Duong, Philippe Fournier-Viger & Hamido Fujita. (2022) H-FHAUI: Hiding frequent high average utility itemsets. Information Sciences 611, pages 408-431.
Crossref
Shalini Jangra & Durga Toshniwal. (2022) Efficient algorithms for victim item selection in privacy-preserving utility mining. Future Generation Computer Systems 128, pages 219-234.
Crossref
Ut Huynh, Bac Le, Duy-Tai Dinh & Hamido Fujita. (2022) Multi-core parallel algorithms for hiding high-utility sequential patterns. Knowledge-Based Systems 237, pages 107793.
Crossref
B. Santhosh Kumar, S. Karthik & R. Cristin. (2021) Certain Inverstigations on Privacy-Preserving Data Mining Using Three-Dimensional Spin Revolution (3DSR) Scheme. Journal of The Institution of Engineers (India): Series B 102:2, pages 387-402.
Crossref
Xuan Liu, Genlang Chen, Shiting Wen & Guanghui Song. (2020) An Improved Sanitization Algorithm in Privacy-Preserving Utility Mining. Mathematical Problems in Engineering 2020, pages 1-14.
Crossref
Xuan Liu, Shiting Wen & Wanli Zuo. (2019) Effective sanitization approaches to protect sensitive knowledge in high-utility itemset mining. Applied Intelligence 50:1, pages 169-191.
Crossref
Felix Zhan. (2019) How to Optimize Social Network Influence. How to Optimize Social Network Influence.
Shaoxin Li, Nankun Mu, Junqing Le & Xiaofeng Liao. (2019) A novel algorithm for privacy preserving utility mining based on integer linear programming. Engineering Applications of Artificial Intelligence 81, pages 300-312.
Crossref
Wensheng Gan, Chun-Wei Lin, Philippe Fournier-Viger, Han-Chieh Chao, Vincent Tseng & Philip Yu. (2019) A Survey of Utility-Oriented Pattern Mining. IEEE Transactions on Knowledge and Data Engineering, pages 1-1.
Crossref
Duy-Tai Dinh, Van-Nam Huynh, Bac Le, Philippe Fournier-Viger, Ut Huynh & Quang-Minh Nguyen. 2019. High-Utility Pattern Mining. High-Utility Pattern Mining 207 232 .
Wensheng Gan, Jerry Chun-Wei, Han-Chieh Chao, Shyue-Liang Wang & Philip S. Yu. (2018) Privacy Preserving Utility Mining: A Survey. Privacy Preserving Utility Mining: A Survey.
Jerry Chun-Wei Lin, Philippe Fournier-Viger, Lintai Wu, Wensheng Gan, Youcef Djenouri & Ji Zhang. (2018) PPSF: An Open-Source Privacy-Preserving and Security Mining Framework. PPSF: An Open-Source Privacy-Preserving and Security Mining Framework.
Vy Huynh Trieu, Chau Truong Ngoc, Hai Le Quoc & Nguyen Nguyen Si. (2018) Algorithm for Hiding High Utility Sensitive Association Rule Based on Intersection Lattice. Algorithm for Hiding High Utility Sensitive Association Rule Based on Intersection Lattice.
Carter Chiu & Justin Zhan. (2018) Deep Learning for Link Prediction in Dynamic Networks Using Weak Estimators. IEEE Access 6, pages 35937-35945.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.